Can I play Xcloud throught TOR if the service is not available in my country? I don’t think so
TOR for me is soooo slow
If I only knew how to speed it up
You hear about vpns more because theres a financial incentive for service providers to shill them as products. Theres no similar financial incentive for tor.
Your use case will dictate which one (or both) that you use and how.
When you do your first connection through TOR (via 3 servers ultimately) your ISP can technically see that first access point you make. Using VPN before TOR is another layer of safety and anonymity.
VPN and Tor are different technologies.
But I do understand why you asked the question. And it’s due to the general misconception that VPNs are for privacy. Just so you know not all VPNs are built for privacy, as the AH configuration that can be implemented on some VPN can reveal some information about a packet. Even the esp vpn that’s more commonly implemented encrypts your data to third party then the third party routes your traffic, still not private in its entirety. So basically purpose of VPN is to securely join you to a private network as if you were physically connected to that network while offering speed and security
On the other hand TORs goal is privacy, and due to the hops between nodes a great deal of speed is lost.
VPNs are great to bypass restrictions, while many platform restrict access through the tor network
Mullvlad is great but something feels off. You remember Skynet Ecc app who was developed by FBI to “offer ultimate privacy”. Just saying
I’m pretty sure if you chain 3 to 5 different VPN companies from different jurisdiction areas it would be super annoying for anyone to trace your traffic back to you.
Not at all impossible, maybe even less safe than tor but for sure more practical and less suspicious.
There are VPN companies where one can pay with cryptocurrency. If you’re going to use cryptocurrency then Monero would be practically untraceable where as if you pay in say Bitcoin, Ethereum or almost every other currency then it’s as easy as looking from which exchange that payment came. If no one accepts monero, you could use a non kyc exchange but if you visit such an exchange and the traffic is logged anywhere, then it will be easier to correlate your traffic if they get one of the VPN providers you used to give out the transaction id, so yeah, Monero is probably where it’s at.
With a VPN I don’t have to wait 6 minutes for a single site to load
It’s fairly easy to compromise TOR…
The issue is now with virtualisation you can spin up thousands of exit nodes in a region and figure out the source of the traffic. Or… you can do it the easy way with a simple browser exploit hahahahah!!
Because I’d rather not let my ISP know what I’m doing either.
The normal person doesn’t know how to use the . There’s also a negative condemnation attached to it, so why not just not give them that info anyways.
Also, vpns are much more dynamic. Easy to turn on and off.
I don’t appreciate the data collection associated with Tor
Most people touting VPNs and privacy don’t have enough operational security experience or technical knowledge to really evade things that go in-band over those VPNs like browser fingerprints, mobile device network switching or identity seperation. Anonymity is much, much more difficult to manage than simply spinning up a VPN.
TOR isn’t a VPN. That’s the main thing you’re missing.
I would humbly suggest using the limited resources of TOR only as really needed. People in some counties really need it while people in more open places might not. If you are able help support TOR by donating or running a node or bridge.
It all depends on your goal. 10+ years ago I was using TOR in high school to bypass restrictions bc most VPNs were getting flagged.
They both have their purposes for certain tasks.
In the grand scheme of things TOR is -small- There’s only like 10k operational nodes. And traffic of around 300gbit/second total.
Operational cost of the network is only around a million dollars a year. Cost of compromising it isn’t really even state actor level. A bored rich dude could do it over several years slowly adding in nodes over time. The harder part is probably generating credible contact information so people thing that you are a bunch of volunteers.
I have little doubt that the NSA has been doing just that. Simply because the budget needed to do so is basically a rounding error on their books.
Looks like Germany keeps taking a shot at it for some reason. They just aren’t exactly patient about it and got their stuff manually delisted. You can’t just dump an pile of servers on there at once and expect not to be noticed. But even then I think they were able to grab up to 2% of traffic on the network for a bit.
Isn’t this classically known as a bad idea? Has something changed in the last 5 or so yrs? I haven’t been paying attention to TOR at all in a long time.
https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea/
Compromising Tor Anonymity - Exploiting P2P Information Leakage
Generally tor is slower and a fair bit overkill for the average user who just wants their ip to come from another country
If you torrent stuff, don’t use tor. Tor wasn’t really designed for the p2p network. It will be extremely slow. It doesn’t support udp traffic, so you may still leak your IP address.